Real-Time SoC Security against Passive Threats Using Crypsis Behavior of Geckos
Citations
9 citations
7 citations
Cites background from "Real-Time SoC Security against Pass..."
...Mitigating passive threats via on-chip self-awareness was demonstrated in Guha et al. (2015, 2017b)....
[...]
...…various phases of Very Large Scale Integration (VLSI) design across This article is an extended version of a previously published conference research paper from the 30th International Conference on VLSI Design and the 16th International Conference on Embedded Systems (VLSID’17) (Guha et al. 2017a)....
[...]
...However, for causing an infinite delay, the payload may be composed of a simple loop architecture with a buffer inside, where for each operation, one unit of delay is caused and the progress is never made (Guha et al. 2017a)....
[...]
...Other than outsourcing the various phases of Very Large Scale Integration (VLSI) design across This article is an extended version of a previously published conference research paper from the 30th International Conference on VLSI Design and the 16th International Conference on Embedded Systems (VLSID’17) (Guha et al. 2017a)....
[...]
...Passive threats affect the confidentiality of the system (e.g., leakage of secret information) (Guha et al. 2017b)....
[...]
6 citations
Cites background from "Real-Time SoC Security against Pass..."
...hardware Trojan is small, the increase in the side-channel parameters is too small to detect [14]....
[...]
...However, the side-channel-based techniques are ineffective when the size of the hardware Trojans is negligible when compared to the size of the SoC [14]....
[...]
4 citations
1 citations
References
35,104 citations
11,224 citations
"Real-Time SoC Security against Pass..." refers background in this paper
...ACO is based on the action of ants where finding optimal solutions is the objective in a space comprising all possible solutions [Dorigo et al. 1996]....
[...]
5,521 citations
Additional excerpts
...DOI: http://dx.doi.org/10.1145/3014166...
[...]
5,265 citations
"Real-Time SoC Security against Pass..." refers methods in this paper
...Similarly, ABC algorithm is based on the foraging behaviour of honey bees, which is used to explore new regions in the search space [Karaboga 2005]....
[...]
...DOI: http://dx.doi.org/10.1145/3014166...
[...]
1,227 citations